www.zdnet.com/pcweek/news/0713/13palm.html -> techupdate.zdnet.com
The top IT priorities in May 2004 are 22 Wired & Wireless, 23 Hardware Upgrades, 24 Software Infrastructure, 25 Security, and 26 Web Technology. Digital information and services will be delivered by trillions of RFID sensors to almost everything we touch-kiosks, airplane seats, newspapers and a broad array of new devices. The privacy issue will prove to be the most daunting challenge in bringing about the fully connected world. Users focusing on lean maintenance management should realize significant savings against an often-ignored budget line item. Following dozens of interviews, The Yankee Group assembled a set of best practices for systems licensing and negotiations. This is particularly true for PCs and other end-user devices. Organizations should strive to keep the number of active vendors low. However, the current reality remains decidedly less tantalizing. RFID tags and networked readers will ultimately replace bar codes and (human) handheld readers. A few key technology trends will impact user decisions during 2004/05. Start-up Fortify Software is pioneering an automated inside-out, root-cause approach that could improve the security of software by systematically weeding out vulnerabilities as an integral part of the software development process. Gartner analyst Richard Hunter says the only defense is for individuals to gain control of their digital information. For companies, the potential for more profits and long-term customers should be enough of an incentive to build competency around the concepts of privacy and trust. The extended enterprise forces organizations to allow onto the corporate network computers (including home PCs, those belonging to business partners and remote employee laptops) with uncontrolled configurations. In fact, Google may become as relevant within enterprises in the future as Microsoft or Cisco are today. In the same announcement, Kumar was appointed to the newly created position of chief software architect. Along with analytics, UAN is critical to Siebel's strategy of expanding and deepening its application and technology footprint within enterprise accounts. To address the authentication issues, Microsoft and Yahoo are advocating their proprietary technologies, while a third, caller-ID-like spec known as Sender Policy Framework is proving why open may be the way to go. Enter SMTPi, a unique and promising if misleadingly named solution.
|